fix: Mitigate command injection risk in GitHub Actions workflow #3009
+20
−6
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Checklist
Description of change
Issue Addressed:
This pull request addresses a command injection vulnerability identified in the GitHub Actions workflow.
Changes Made:
Updated the log-conditions job in the GitHub Actions workflow to mitigate command injection vulnerabilities by escaping special characters and using environment variables securely.
Added example payloads and descriptions for testing the vulnerability and ensuring secure handling of user inputs.
@DavidBakerEffendi